In-Depth Network Penetration Testing.
Extensive efforts will be invested till compromising Domain Controller.
Overview of the assessment after signing the Rules of Engagement:
- Scoping and reconnaissance
- In-Depth scanning
- Exploitation (including Client-Side)
- Post exploitation and In-Depth password attacks.
- Web Application pen-testing on Intranet web applications
- Advanced network attacks:
--- Bypassing NAC
--- OSPF attacks
--- Pen-testing cryptographic implementations
- Reverse engineering interesting in-scope Linux / Windows binaries and exploitation (if vulnerabilities are identified) - then redirecting code execution after defeating protections like ASLR, DEP etc. [Last option]
Reviews For This Service